Analysis
-
max time kernel
108s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:59
Static task
static1
Behavioral task
behavioral1
Sample
d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe
Resource
win10v2004-20230220-en
General
-
Target
d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe
-
Size
689KB
-
MD5
1a4850e6c05bad88218cedf0f3cb1409
-
SHA1
d7e71dbb1891ce26b29278bb1ad26fa40ebdb43e
-
SHA256
d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6
-
SHA512
e16767d4c4029529affee34793fbed4094c6712a378e6b4bdde1afda2b42a4642a83ffa45be58dbd3c60aad5eae4aecfa810f368cfae3bd6b5a748d3a2b7c401
-
SSDEEP
12288:LMray900bYq6G2zr1jHaBApyB65hLufDM3+D22bgzV5hvBFmWfighOUVIbgrg+:ByJb76G6NDgMfaG+D2Lx7jmWagXV2c
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro9641.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9641.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9641.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3112-194-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-195-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-197-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-199-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-201-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-203-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-205-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-207-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-209-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-211-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-213-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-215-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-217-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-219-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-221-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-223-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-225-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline behavioral1/memory/3112-227-0x0000000003A70000-0x0000000003AAF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un168700.exepro9641.exequ0853.exesi678252.exepid process 4140 un168700.exe 4736 pro9641.exe 3112 qu0853.exe 3360 si678252.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9641.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9641.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exeun168700.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un168700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un168700.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2572 4736 WerFault.exe pro9641.exe 748 3112 WerFault.exe qu0853.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9641.exequ0853.exesi678252.exepid process 4736 pro9641.exe 4736 pro9641.exe 3112 qu0853.exe 3112 qu0853.exe 3360 si678252.exe 3360 si678252.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9641.exequ0853.exesi678252.exedescription pid process Token: SeDebugPrivilege 4736 pro9641.exe Token: SeDebugPrivilege 3112 qu0853.exe Token: SeDebugPrivilege 3360 si678252.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exeun168700.exedescription pid process target process PID 5076 wrote to memory of 4140 5076 d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe un168700.exe PID 5076 wrote to memory of 4140 5076 d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe un168700.exe PID 5076 wrote to memory of 4140 5076 d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe un168700.exe PID 4140 wrote to memory of 4736 4140 un168700.exe pro9641.exe PID 4140 wrote to memory of 4736 4140 un168700.exe pro9641.exe PID 4140 wrote to memory of 4736 4140 un168700.exe pro9641.exe PID 4140 wrote to memory of 3112 4140 un168700.exe qu0853.exe PID 4140 wrote to memory of 3112 4140 un168700.exe qu0853.exe PID 4140 wrote to memory of 3112 4140 un168700.exe qu0853.exe PID 5076 wrote to memory of 3360 5076 d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe si678252.exe PID 5076 wrote to memory of 3360 5076 d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe si678252.exe PID 5076 wrote to memory of 3360 5076 d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe si678252.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe"C:\Users\Admin\AppData\Local\Temp\d92f18c454696df3f792c77db9f22f23f05e46e63999016d5642654e154430b6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un168700.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un168700.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9641.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9641.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 10844⤵
- Program crash
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0853.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0853.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 18684⤵
- Program crash
PID:748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si678252.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si678252.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4736 -ip 47361⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3112 -ip 31121⤵PID:3216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5155d23db3cd1b57d9e6da6d8a96cb660
SHA1fde264888357c5b7b48fbf04e65df537aa90abaa
SHA256ebdfee9b4c2c09631022cc34dd71adc3b0c3eee32bc0d6709beab804bb423eb3
SHA512fcf4b407af18b30d67df64abae334f32a1f00cd47740bddb25783e136d464753c7dc7165398ce34b9930dbf651aed90701ca0a14f1585b1b56022699742f2d7b
-
Filesize
175KB
MD5155d23db3cd1b57d9e6da6d8a96cb660
SHA1fde264888357c5b7b48fbf04e65df537aa90abaa
SHA256ebdfee9b4c2c09631022cc34dd71adc3b0c3eee32bc0d6709beab804bb423eb3
SHA512fcf4b407af18b30d67df64abae334f32a1f00cd47740bddb25783e136d464753c7dc7165398ce34b9930dbf651aed90701ca0a14f1585b1b56022699742f2d7b
-
Filesize
548KB
MD500b0f00325b8678c68ddc7ab9f82e335
SHA1e0d401512c8a195dd792a8bec54a892aa8802569
SHA256dbaef73b1cf6f2981b6ab2c709b4404dbab0eebd15eccaec7158879049b8eb7b
SHA512f96cd2dfa3b49d9684913d80bc51f87ce0870f47a3b42f569f86216d0ed1fb70cc48cc503a3013caa1239f18f9ec7851f0bc1458fd25a2d498bfd5866c07ab81
-
Filesize
548KB
MD500b0f00325b8678c68ddc7ab9f82e335
SHA1e0d401512c8a195dd792a8bec54a892aa8802569
SHA256dbaef73b1cf6f2981b6ab2c709b4404dbab0eebd15eccaec7158879049b8eb7b
SHA512f96cd2dfa3b49d9684913d80bc51f87ce0870f47a3b42f569f86216d0ed1fb70cc48cc503a3013caa1239f18f9ec7851f0bc1458fd25a2d498bfd5866c07ab81
-
Filesize
291KB
MD5520408665cce97c8058fbddaf8300609
SHA1af480cefaf25e0f614fa5383528a65278732de94
SHA25690f4f3aeaa3eaa96ab977152dd16ab1631fd116ec29f1977e67205e2f1cb643f
SHA512bc7a23aecd39d50c0548fba72bada4267f9e485fc579e9496f3d3ce37e3c5ea08c2ee90a112f35575b68c438ed9f1d60b68d76fb11346c96c7403f64496ceed9
-
Filesize
291KB
MD5520408665cce97c8058fbddaf8300609
SHA1af480cefaf25e0f614fa5383528a65278732de94
SHA25690f4f3aeaa3eaa96ab977152dd16ab1631fd116ec29f1977e67205e2f1cb643f
SHA512bc7a23aecd39d50c0548fba72bada4267f9e485fc579e9496f3d3ce37e3c5ea08c2ee90a112f35575b68c438ed9f1d60b68d76fb11346c96c7403f64496ceed9
-
Filesize
345KB
MD589fadc7854298e4ad5e6c6d647cbe091
SHA16f7c4675d9d233c7b4bee79b9a8348d37b51e83d
SHA2563caaabca16b83bef27dd18e54f1ebca968b24e125e9a7b5574ff7ac82d13ed6a
SHA512d00ab4ad3b0d6a1cd4d6df6098f0b881c44a19d5e5cb283756f2e6088326ca59ec6b9ef567df22679d479c0098fb2a73cb8d1ae01dbcfbe1fc8a0106855171c3
-
Filesize
345KB
MD589fadc7854298e4ad5e6c6d647cbe091
SHA16f7c4675d9d233c7b4bee79b9a8348d37b51e83d
SHA2563caaabca16b83bef27dd18e54f1ebca968b24e125e9a7b5574ff7ac82d13ed6a
SHA512d00ab4ad3b0d6a1cd4d6df6098f0b881c44a19d5e5cb283756f2e6088326ca59ec6b9ef567df22679d479c0098fb2a73cb8d1ae01dbcfbe1fc8a0106855171c3